Skip to main content
Log in

Network attack prediction method based on threat intelligence for IoT

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The Social Internet of Things (SIoT) is a combination of the Internet of Things (IoT) and social networks, which enables better service discovery and improves the user experience. The threat posed by the malicious behavior of social network accounts also affects the SIoT, this paper studies the analysis and prediction of malicious behavior for SIoT accounts, proposed a method for predicting malicious behavior of SIoT accounts based on threat intelligence. The method uses support vector machine (SVM) to obtain threat intelligence related to malicious behavior of target accounts, analyze contextual data in threat intelligence to predict the behavior of malicious accounts. By collecting and analyzing the data in a SIoT environment, verifies the malicious behavior prediction method of SIoT account proposed in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Atzori L, Iera A, Morabito G (2011) SIOt: giving a social structure to the internet of things. IEEE Commun Lett 15(11):1193–1195

    Article  Google Scholar 

  2. Bao-Tong M, Xun L, Shu-Sen Z (2018) A survey on SIoT. Online Publishing 41

  3. Boshmaf Y, Muslukhov I, Beznosov K et al (2011) The socialbot network: when bots socialize for fame and money. In: 27th computer security applications conference, pp 93–102

  4. Douceur J R (2002) The sybil attack international workshop on peer-to-peer systems. Springer, Berlin, pp 251–260

    Book  Google Scholar 

  5. Gao H, Hu J, Wilson C et al (2010) Detecting and characterizing social spam campaigns. Duke University, Durham, pp 681–683

    Google Scholar 

  6. Gartner (2018) Definition: threat intelligence. https://www.gartner.com/doc/2487216/definition-threat-intelligence.Gartner. Accessed 05 June 2018

  7. Guinard D, Trifa V (2009) Towards the web of things: web mashups for embedded devices

  8. Guinard D, Fischer M, Trifa V (2010) Sharing using social networks in a composable web of things. IEEE International Conference on Pervasive Computing and Communications Workshops. IEEE 2010:702–707

    Google Scholar 

  9. Guo R, Wang H, Zhong L et al (2014) Harbinger: an analyzing and predicting system for online social network users’ behavior. In: International conference on database systems for advanced applications. Springer International Publishing, pp 531–534

  10. Liu W, Luo X, Liu Y, Liu J, Liu M, Shi YQ (2018) Localization algorithm of indoor Wi-Fi access points based on signal strength relative relationship and region division. Computers, Materials & Continua 55(1):071–093

    Google Scholar 

  11. Tran N, Li J, Subramanian L et al (2011) Optimal Sybil-resilient node admission control. In: IEEE INFOCOM. IEEE, pp 3218–3226

  12. Vapnik Vladimir N (1995) The nature of statistical learning theory. Technometrics 38(4):409–409

    MATH  Google Scholar 

  13. Wang G, Konolige T, Wilson C et al (2013) You are how you click: clickstream analysis for Sybil detection. In: Usenix conference on security, pp 241–256

  14. Wu C, Zapevalova E, Chen Y, Li F (2018) Time optimization of multiple knowledge transfers in the big data environment. Comput Mater Continua 54(3):269–285

    Google Scholar 

  15. Zangerle E, Specht G (2014) “sorry, I was hacked” a classification of compromised Twitter accounts. In: Proceedings of the 29th annual ACMS syposium on applied computing. Gyeongju, Korea, pp 587–593

Download references

Acknowledgements

This research was supported by the National Natural Science Foundation of China (61672206,61572170), Hebei Province Science and Technology Support Program (17210104D), Hebei Province Innovation Capacity Improvement Program Soft Science Research and Science Popularization Project (17K50702D), College Science and Technology Research Project of Heibei Province (ZD2015099). Yuzi Yi is the corresponding author of this article.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuzi Yi.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, H., Yi, Y., Wang, J. et al. Network attack prediction method based on threat intelligence for IoT. Multimed Tools Appl 78, 30257–30270 (2019). https://doi.org/10.1007/s11042-018-7005-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-7005-2

Keywords

Navigation